Received: by 2002:a05:7412:b101:b0:e2:908c:2ebd with SMTP id az1csp3150464rdb; Thu, 16 Nov 2023 01:18:11 -0800 (PST) X-Google-Smtp-Source: AGHT+IHL7m0ZZdqIvH8LetJ8qUHazWgY6pg1nGOq0gczahVXQCoqHRbJ14Zam0vPh/0LKAdAsLEC X-Received: by 2002:a05:6871:448e:b0:1ef:15f5:1733 with SMTP id ne14-20020a056871448e00b001ef15f51733mr16560939oab.25.1700126290864; Thu, 16 Nov 2023 01:18:10 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1700126290; cv=none; d=google.com; s=arc-20160816; b=nvv0OeHrl6pAZf3/b/yyaOLHuVa6vxLi6LQYfgK9V1xYGyWebVHxSoKnCPOjcAG92R qP4pSaqznqfYSiZyVcvbLleNL/XirqXO8RdaigohUsz20xgpk+kizFkutQA20BJqgfaL CzkwW93w+7FAE22NNxC1PfeVGciqfNPk5hxsPtyZdeIy9s7fVdTaNzjCbRhqZSU8su7O nw63n8/Dp2f1DHxjraXh3pp3bMtQGpAf1qYLA4W4SrEbohhHLOnChrwVOHuh+7V4umw3 e1q/FMu6z+Irk6ASZPNJdvoqhFk1tzRkUG8bS/UXqzbmC9goeCLedDmiv8d6e4Ax3X6u nMag== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:user-agent :content-transfer-encoding:references:in-reply-to:date:cc:to:from :subject:message-id:dkim-signature; bh=4cXgi5VLXXOtLpoCPr1dWCi1lxs5btqANVR2MmquTPI=; fh=DRu6qs0R2xKQX+9GuRjR62JGLrpnTaOE1wQSzv/gHhk=; b=g6cOI8bClW/PS/RO6PLU7M6TwR0P/4ceNA3id3NpDcvdRIjiiZiHX7uOXPiLS1kuTc FYBcLpQG1pTzhR/XNLXQqYxAg1VFZgSz5XtcwXPqJEnctq2ra1fBRuB3cLh9TZNEI8re YIayB/O9E+tRrkUBQ47UAClTzGz4F96mpQZALWUGfGS/1uYiZNYA47Pu6turzZ0CQkqm NYj5i94oKY7Wvkzx5i1oaENHjYF3WOEsg5TgFj519Ywvw4D1+BbB0DHM4U5cuuh1W1nG za1G7QupKEdAlrwHi0lHS7KvijeaTinJlt5Hb19zAA0nojN0kTcVlr0iVNs8WBwLV9qY wWqQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ibm.com header.s=pp1 header.b=rdPuCKlp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:8 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from fry.vger.email (fry.vger.email. [2620:137:e000::3:8]) by mx.google.com with ESMTPS id by28-20020a056a02059c00b005b90972529dsi12544462pgb.456.2023.11.16.01.18.10 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 16 Nov 2023 01:18:10 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:8 as permitted sender) client-ip=2620:137:e000::3:8; Authentication-Results: mx.google.com; dkim=pass header.i=@ibm.com header.s=pp1 header.b=rdPuCKlp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:8 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=NONE dis=NONE) header.from=ibm.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by fry.vger.email (Postfix) with ESMTP id 2AB6C8080E2C; Thu, 16 Nov 2023 01:18:08 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at fry.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235471AbjKPJRz (ORCPT + 99 others); Thu, 16 Nov 2023 04:17:55 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60376 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230274AbjKPJRy (ORCPT ); Thu, 16 Nov 2023 04:17:54 -0500 Received: from mx0a-001b2d01.pphosted.com (mx0a-001b2d01.pphosted.com [148.163.156.1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4AA2C9C; Thu, 16 Nov 2023 01:17:51 -0800 (PST) Received: from pps.filterd (m0353729.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 3AG8ufRF022742; Thu, 16 Nov 2023 09:17:27 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ibm.com; h=message-id : subject : from : to : cc : date : in-reply-to : references : content-type : content-transfer-encoding : mime-version; s=pp1; bh=4cXgi5VLXXOtLpoCPr1dWCi1lxs5btqANVR2MmquTPI=; b=rdPuCKlpYMGWIfCGci5iQlDKqnHDj4WqIJroDuCnt/9RNOuJisZAgEerL0JTPCsSAYgU 6dp6M/UJBSNM3v1qJ9V6LbyrQTcIAEfLD+KsX7sGGmcS8gmYYq9huXRfxLS/eK4DweTW oDs3opIRB6AdMYHjzHl4xM5CC11s9WQ7mOnR1+NKsmuLXd3gIJ4uTLQ1BF0VXlpmlKe5 AyS4qUq5Q6R8qYcu2nXPXYWR3jJyUPPExk3ciGGXfNHEFEFVtdsjqT33IUM4i/unL88f kKCBDIBapsO4U8Ea9VX4vRZPrAWwug4SDwQ4I9GmAx/LD/nKZxgClYuW6LF1Wrl4DwP7 nQ== Received: from pps.reinject (localhost [127.0.0.1]) by mx0a-001b2d01.pphosted.com (PPS) with ESMTPS id 3udebbkfuf-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 16 Nov 2023 09:17:27 +0000 Received: from m0353729.ppops.net (m0353729.ppops.net [127.0.0.1]) by pps.reinject (8.17.1.5/8.17.1.5) with ESMTP id 3AG8xPbq031471; Thu, 16 Nov 2023 09:17:26 GMT Received: from ppma12.dal12v.mail.ibm.com (dc.9e.1632.ip4.static.sl-reverse.com [50.22.158.220]) by mx0a-001b2d01.pphosted.com (PPS) with ESMTPS id 3udebbkftj-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 16 Nov 2023 09:17:26 +0000 Received: from pps.filterd (ppma12.dal12v.mail.ibm.com [127.0.0.1]) by ppma12.dal12v.mail.ibm.com (8.17.1.19/8.17.1.19) with ESMTP id 3AG8XrrI026751; Thu, 16 Nov 2023 09:17:24 GMT Received: from smtprelay01.fra02v.mail.ibm.com ([9.218.2.227]) by ppma12.dal12v.mail.ibm.com (PPS) with ESMTPS id 3uakxt60at-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 16 Nov 2023 09:17:24 +0000 Received: from smtpav06.fra02v.mail.ibm.com (smtpav06.fra02v.mail.ibm.com [10.20.54.105]) by smtprelay01.fra02v.mail.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id 3AG9HLfP18154126 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 16 Nov 2023 09:17:22 GMT Received: from smtpav06.fra02v.mail.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id DE39720040; Thu, 16 Nov 2023 09:17:21 +0000 (GMT) Received: from smtpav06.fra02v.mail.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 97C8F20049; Thu, 16 Nov 2023 09:17:20 +0000 (GMT) Received: from [9.179.9.51] (unknown [9.179.9.51]) by smtpav06.fra02v.mail.ibm.com (Postfix) with ESMTP; Thu, 16 Nov 2023 09:17:20 +0000 (GMT) Message-ID: <8fb810e5000dd66334a4a686407c0caeacb79f55.camel@linux.ibm.com> Subject: Re: [PATCH 12/32] kmsan: Allow disabling KMSAN checks for the current task From: Ilya Leoshkevich To: Alexander Potapenko Cc: Alexander Gordeev , Andrew Morton , Christoph Lameter , David Rientjes , Joonsoo Kim , Marco Elver , Masami Hiramatsu , Pekka Enberg , Steven Rostedt , Vasily Gorbik , Vlastimil Babka , Christian Borntraeger , Dmitry Vyukov , Hyeonggon Yoo <42.hyeyoo@gmail.com>, kasan-dev@googlegroups.com, linux-kernel@vger.kernel.org, linux-mm@kvack.org, linux-s390@vger.kernel.org, linux-trace-kernel@vger.kernel.org, Mark Rutland , Roman Gushchin , Sven Schnelle Date: Thu, 16 Nov 2023 10:17:20 +0100 In-Reply-To: References: <20231115203401.2495875-1-iii@linux.ibm.com> <20231115203401.2495875-13-iii@linux.ibm.com> Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable User-Agent: Evolution 3.48.4 (3.48.4-1.fc38) MIME-Version: 1.0 X-TM-AS-GCONF: 00 X-Proofpoint-ORIG-GUID: vSTD9xF44d83VprYex3tMD-37iq0_k9g X-Proofpoint-GUID: oH4OOC-OhoTloo5LiN9lT2emIfEOQ-qd X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.272,Aquarius:18.0.987,Hydra:6.0.619,FMLib:17.11.176.26 definitions=2023-11-16_07,2023-11-15_01,2023-05-22_02 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 clxscore=1015 lowpriorityscore=0 mlxlogscore=999 malwarescore=0 suspectscore=0 adultscore=0 priorityscore=1501 mlxscore=0 bulkscore=0 phishscore=0 impostorscore=0 spamscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2311060000 definitions=main-2311160074 X-Spam-Status: No, score=-0.8 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on fry.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (fry.vger.email [0.0.0.0]); Thu, 16 Nov 2023 01:18:08 -0800 (PST) On Thu, 2023-11-16 at 09:56 +0100, Alexander Potapenko wrote: > On Wed, Nov 15, 2023 at 9:34=E2=80=AFPM Ilya Leoshkevich > wrote: > >=20 > > Like for KASAN, it's useful to temporarily disable KMSAN checks > > around, > > e.g., redzone accesses. >=20 > This example is incorrect, because KMSAN does not have redzones. > You are calling these functions from "mm: slub: Let KMSAN access > metadata", which mentiones redzones in kfree(), but the description > is > still somewhat unclear. > Can you provide more insight about what is going on? Maybe we can fix > those accesses instead of disabling KMSAN? It's about SLUB redzones, which appear when compiling with CONFIG_DEBUG_SLAB. I think that from KMSAN's point of view they should be considered poisoned, but then the question is what to do with functions that check them. I noticed that there was special handling for KASAN there already, so I figured that the best solution would be to do the same thing for KMSAN.